Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ian F. Blake is active.

Publication


Featured researches published by Ian F. Blake.


IEEE Transactions on Communications | 2010

Quasi-Cyclic LDPC Codes: An Algebraic Construction, Rank Analysis, and Codes on Latin Squares

Li Zhang; Qin Huang; Shu Lin; Khaled A. S. Abdel-Ghaffar; Ian F. Blake

Quasi-cyclic LDPC codes are the most promising class of structured LDPC codes due to their ease of implementation and excellent performance over noisy channels when decoded with message-passing algorithms as extensive simulation studies have shown. In this paper, an approach for constructing quasi-cyclic LDPC codes based on Latin squares over finite fields is presented. By analyzing the parity-check matrices of these codes, combinatorial expressions for their ranks and dimensions are derived. Experimental results show that, with iterative decoding algorithms, the constructed codes perform very well over the AWGN and the binary erasure channels.


IEEE Transactions on Mobile Computing | 2012

Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions

Majid Khabbazian; Ian F. Blake; Vijay K. Bhargava

There are two main approaches, static and dynamic, to broadcast algorithms in wireless ad hoc networks. In the static approach, local algorithms determine the status (forwarding/nonforwarding) of each node proactively based on local topology information and a globally known priority function. In this paper, we first show that local broadcast algorithms based on the static approach cannot achieve a good approximation factor to the optimum solution (an NP-hard problem). However, we show that a constant approximation factor is achievable if (relative) position information is available. In the dynamic approach, local algorithms determine the status of each node on-the-fly” based on local topology information and broadcast state information. Using the dynamic approach, it was recently shown that local broadcast algorithms can achieve a constant approximation factor to the optimum solution when (approximate) position information is available. However, using position information can simplify the problem. Also, in some applications it may not be practical to have position information. Therefore, we wish to know whether local broadcast algorithms based on the dynamic approach can achieve a constant approximation factor without using position information. We answer this question in the positive-we design a local broadcast algorithm in which the status of each node is decided on-the-fly” and prove that the algorithm can achieve both full delivery and a constant approximation to the optimum solution.


IEEE Transactions on Wireless Communications | 2011

Performance and Optimization of Amplify-and-Forward Cooperative Diversity Systems in Generic Noise and Interference

Amir Nasri; Robert Schober; Ian F. Blake

Cooperative diversity systems have received significant attention recently as a distributed means of exploiting the inherent spatial diversity of wireless networks. In this paper, we consider a cooperative diversity system consisting of a source, a destination, and multiple single-hop amplify-and-forward relays, and provide a mathematical framework for the asymptotic analysis of this system in generic noise and interference for high signal-to-noise ratios. Assuming independent Rayleigh fading for all links in the network and orthogonal relay-destination channels, we obtain simple and elegant closed-form expressions for the asymptotic symbol and bit error rates valid for arbitrary linear modulation formats, arbitrary numbers of relays, and arbitrary types of noise and interference with finite moments including co-channel interference, ultra-wideband interference, impulsive ε-mixture noise, generalized Gaussian noise, and Gaussian noise. Furthermore, we exploit the derived analytical error rate expressions to develop power allocation, relay selection, and relay placement schemes that are asymptotically optimal in environments with generic noise and interference. In general, the power allocation problem results in a geometric program which can be solved efficiently numerically. For the special case of only one relay, we provide a closed-form result for the optimal power allocation. Simulation results confirm our analysis and illustrate that, in non-Gaussian noise, the proposed power allocation, relay selection, and relay placement schemes lead to large performance gains compared to their conventional counterparts optimized for Gaussian noise.


IEEE Transactions on Information Forensics and Security | 2011

Probabilistic Analysis of Blocking Attack in RFID Systems

Ehsan Vahedi; Vahid Shah-Mansouri; Vincent W. S. Wong; Ian F. Blake; Rabab K. Ward

Radio-frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. Using RFID tags can simplify many applications and provide many benefits. Meanwhile, the privacy of the customers should be taken into account. A potential threat for the privacy of a user is that of anonymous readers obtaining information about the tags in the system. The use of a blocker tag has been proposed as a solution to avoid unwanted tag interrogations. A blocker tag can simulate all or a portion of tag IDs in the system. This prevents the malicious readers from identifying the tags and obtaining information from the system. Although this solution is simple to implement and has a low cost, it may add another threat to the RFID system if used as a malicious tool to attack the system. A malicious blocker tag can deteriorate the performance of an RFID system by simulating fake tag IDs. In this paper, we study the use of blocker tags for malicious attacks that can prevent nearby legitimate readers from correctly receiving the reply messages from the tags. The blocker attack is a medium access control (MAC)-layer denial of service (DoS) threat and we propose a lower-layer solution for this attack. We mathematically model the blocker attack for RFID systems which operate based on the binary tree walking or ALOHA singulation techniques. Using the developed analytical framework, we propose a probabilistic blocker tag detection (P-BTD) algorithm to detect the presence of an attacker in the RFID system. The P-BTD algorithm can detect the existence of a blocker tag using the information extracted from the interrogations performed by the reader. Simulation results show that our proposed algorithm has a better performance than the threshold-based detection algorithm in terms of the number of required interrogations.


IEEE Transactions on Automation Science and Engineering | 2014

Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2

Ehsan Vahedi; Rabab K. Ward; Ian F. Blake

Radio frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique identification (ID) number. RFID tags can be categorized into passive and active tags. For passive tags, a standard communication protocol known as EPC-global Generation-2, or briefly EPC Gen-2, is currently in use. RFID systems are prone to transmission collisions due to the shared nature of the wireless channel used by tags. The EPC Gen-2 standard recommends using dynamic framed slotted ALOHA technique to solve the collision issue and to read the tag IDs successfully. Recently, some researchers have suggested to replace the dynamic framed slotted ALOHA technique used in the standard EPC Gen-2 protocol with the code division multiple access (CDMA) technique to reduce the number of collisions and to improve the tag identification procedure. In this paper, the standard EPC Gen-2 protocol and the CDMA-based tag identification schemes are modeled as absorbing Markov chain systems. Using the proposed Markov chain systems, the analytical formulae for the average number of queries and the total number of transmitted bits needed to identify all tags in an RFID system are derived for both the EPC Gen-2 protocol and the CDMA-based tag identification schemes. In the next step, the performance of the EPC Gen-2 protocol is compared with the CDMA-based tag identification schemes and it is shown that the standard EPC Gen-2 protocol outperforms the CDMA-based tag identification schemes in terms of the number of transmitted bits and the average time required to identify all tags in the system.


IEEE Transactions on Automation Science and Engineering | 2011

Probabilistic Analysis and Correction of Chen's Tag Estimate Method

Ehsan Vahedi; Vincent W. S. Wong; Ian F. Blake; Rabab K. Ward

Radio frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. For some RFID applications and in the ALOHA-based anticollision algorithms, the number of tags in the system needs to be estimated. In Trans. Autom. Sci. Eng., vol 6, no. 1, pp. 9-15, Jan. 2009, Chen, a probabilistic method for tag estimation in ALOHA-based RFID systems was proposed, based on the maximum a posteriori probability. Although this approach is novel and useful, it has a mathematical error in modeling the problem. In this short paper, we address this problem and provide the correct probabilistic model for the ALOHA-based RFID systems. Some consequences of correcting the error in Trans. Autom. Sci. Eng., vol 6, no. 1, pp. 9-15, Jan. 2009, Chen, are discussed and the model is validated via simulation. Using the correct model, the performance of the ALOHA-based anticollision algorithm can be improved.


computational intelligence and security | 2011

Security analysis and complexity comparison of some recent lightweight RFID protocols

Ehsan Vahedi; Rabab K. Ward; Ian F. Blake

Using RFID tags can simplify many applications and provide many benefits, but the privacy of the customers should be taken into account. A potential threat for the privacy of a user is that anonymous readers can obtain information about the tags in the system. In order to address the security issues of RFID systems, various schemes have been proposed. Among the various solutions, lightweight protocols have attracted much attention as they are more appropriate for the limited architecture of RFID tags. In this paper, we perform the security analysis of five lightweight protocols proposed in [1-4] and discuss their advantages and security issues. The computational complexity of these lightweight protocols are also compared in this work.


IEEE Transactions on Information Theory | 2016

New Classes of Partial Geometries and Their Associated LDPC Codes

Qiuju Diao; Juane Li; Shu Lin; Ian F. Blake

The use of partial geometries to construct parity-check matrices for binary low-density parity-check (LDPC) codes has resulted in the design of successful codes with a probability of error on the AWGN channel close to the Shannon capacity at bit error rate down to


international symposium on turbo codes and iterative information processing | 2014

Error floors and finite geometries

Shu Lin; Qiuju Diao; Ian F. Blake

10^{-15}


international conference on communications | 2010

A Probabilistic Approach for Detecting Blocking Attack in RFID Systems

Ehsan Vahedi; Vahid Shah-Mansouri; Vincent W. S. Wong; Ian F. Blake

. Such considerations have motivated this further investigation. A new and simple construction of a type of partial geometries with a quasi-cyclic (QC) structure is given and their properties are investigated. Two new classes of this type of partial geometries, one based on prime fields and the other based on cyclic subgroups of prime orders of finite fields, are constructed. QC-LDPC codes with good error performances are constructed based on these two new classes of partial geometries. The trapping sets of the partial geometry codes were previously considered using the geometric aspects of the underlying structure to derive information on the size of allowable trapping sets. This topic is further considered here. Finally, there is a natural relationship between partial geometries and strongly regular graphs. The eigenvalues of the adjacency matrices of such graphs are well known, and it is of interest to determine if any of the Tanner graphs derived from the partial geometries are good expanders for certain parameter sets, since it can be argued that codes with good geometric and expansion properties might perform well on the AWGN channel under message-passing decoding.

Collaboration


Dive into the Ian F. Blake's collaboration.

Top Co-Authors

Avatar

Ehsan Vahedi

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Shu Lin

University of California

View shared research outputs
Top Co-Authors

Avatar

Rabab K. Ward

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Vincent W. S. Wong

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amir Nasri

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Lutz Lampe

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Seyed Ali Saberali

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Li Zhang

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge